Aarhus University Seal

Publications

Search for publications at Department of Computer Science

Below you find a complete list of publications published and edited by scientists at the Department of Computer Science

Sort by: Date | Author | Title

Faonio, A., Nielsen, J. B. & Venturi, D. (2015). Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation. In M. M. Halldórsson, K. Iwama, N. Kobayashi & B. Speckmann (Eds.), Automata, Languages, and Programming: 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part I (Vol. Part 1, pp. 456-468). Springer VS. https://doi.org/10.1007/978-3-662-47672-7_37
Sieczkowski, F., Bizjak, A. & Birkedal, L. (2015). ModuRes: A Coq Library for Modular Reasoning About Concurrent Higher-Order Imperative Programming Languages. In C. Urban & X. Zhang (Eds.), Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing, China, August 24-27, 2015, Proceedings (pp. 375-390). Springer. https://doi.org/10.1007/978-3-319-22102-1_25
Antoy, S., Johannsen, J. & Libby, S. (2015). Needed computations shortcutting needed steps. In Electronic Proceedings in Theoretical Computer Science, EPTCS (Vol. 183, pp. 18-32). Open Publishing Association. https://doi.org/10.4204/EPTCS.183.2
Clifford, R., Jørgensen, A. G. & Larsen, K. G. (2015). New Unconditional Hardness Results for Dynamic and Online Problems. In 56th IEEE Symposium on Foundations of Computer Science (FOCS) Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS IEEE Computer Society Press. http://arxiv.org/pdf/1504.01836v1.pdf
Bhattacharyya, R. & Mukherjee, P. (2015). Non-adaptive programmability of random oracle. Theoretical Computer Science, 592, 97-114. https://doi.org/10.1016/j.tcs.2015.05.026
Østerby, O. (2015). Numerical Solution of Parabolic Equations. Department of Computer Science, Aarhus University. https://doi.org/10.7146/aul.5.5
Kyng, M. (2015). On Creating and Sustaining Alternatives: The case of Danish Telehealth. In O. Bertelsen & K. Halskov (Eds.), Critical Alternatives, 5th decennial Aarhus Conference: conference proceedings, conference papers Department of Computer Science, Aarhus University. https://doi.org/10.7146/aahcc.v1i1.21297
Larsen, K. G., Munro, J. I., Nielsen, J. S. & Thankachan, S. V. (2015). On hardness of several string indexing problems. Theoretical Computer Science, 582, 74-82. https://doi.org/10.1016/j.tcs.2015.03.026
Verdezoto, N. & Grönvall, E. (2015). On preventive blood pressure self-monitoring at home. Cognition, Technology and Work, 18(2), 267-285. https://doi.org/10.1007/s10111-015-0358-7
Cascudo Pueyo, I., Cramer, R., Mirandola, D., Padró, C. & Xing, C. (2015). On Secret Sharing with Nonlinear Product Reconstruction. S I A M Journal on Discrete Mathematics, 29(2), 1114-1131. https://doi.org/10.1137/130931886
Hubacek, P. & Wichs, D. (2015). On the Communication Complexity of Secure Function Evaluation with Long Output. In T. Roughgarden (Ed.), Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, ITCS '15 (pp. 163-172 ). Association for Computing Machinery. https://doi.org/10.1145/2688073.2688105
Damgård, I. B., Dupont-Dupuis, F. & Nielsen, J. B. (2015). On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient Computation. In Information Theoretic Security: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings (pp. 87-104). Springer VS. https://doi.org/10.1007/978-3-319-17470-9_6
Durkota, K., Lisý, W., Kiekintveld, C. & Bosansky, B. (2015). Optimal Network Security Hardening Using Attack Graph Games. In N. Criado, M. Rehak, J. M. Such & L. Vercouter (Eds.), 2nd International Workshop on Agents and Cybersecurity, ACySE 2015: Workshop Notes at AAMAS 2015 (pp. 7-14). Lancaster University. http://www.lancaster.ac.uk/staff/suchj/acyse2015-proceedings/ACySE2015_proceedings.pdf#page=14
Micenková, B. (2015). Outlier Detection and Explanation for Domain Experts. Department of Computer Science, University of Aarhus.
Bødker, S. & Zander, P.-O. (2015). Participation in design between public sector and local communities. In B. Begole & J. Kim (Eds.), Proceedings of the 7th International Conference on Communities and Technologies, C&T '15 Association for Computing Machinery. https://doi.org/10.1145/2768545.2768546
Nielsen, M. & Grønbæk, K. (2015). PivotViz: Interactive Visual Analysis of Multidimensional Library Transaction Data. In Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries, JCDL '15 : Large, Dynamic and Ubiquitous –The Era of the Digital Library (pp. 139-142). Association for Computing Machinery. https://doi.org/10.1145/2756406.2756937
Feldthaus, A. (2015). Pointer Analysis for JavaScript Programming Tools. Department of Computer Science, Aarhus University.
Jakobsen, T. P. (2015). Practical Aspects of Secure Multiparty Computation. Department of Computer Science, Aarhus University.
Nüchel, J., Bøcher, P. K. & Svenning, J.-C. (2015). Present and potential distribution of Snub-nosed Monkey. Poster session presented at International Biogeography Society: 7th Biennial Conference, Bayreuth, Germany.
Meiklejohn, S. & Orlandi, C. (2015). Privacy-enhancing overlays in bitcoin. In M. Brenner , N. Christin , B. Johnson & K. Rohloff (Eds.), Financial Cryptography and Data Security : FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers (Vol. 8976, pp. 127-141). Springer. https://doi.org/10.1007/978-3-662-48051-9_10
Frederiksen, T. K., Nielsen, J. B. & Orlandi, C. (2015). Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge. In E. Oswald & M. Fischlin (Eds.), Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II (pp. 191-219). Springer VS. https://doi.org/10.1007/978-3-662-46803-6_7
Clouston, R., Bizjak, A., Grathwohl, H. B. & Birkedal, L. (2015). Programming and reasoning with guarded recursion for coinductive types. In A. Pitts (Ed.), Foundations of Software Science and Computation Structures: 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (pp. 305-316). Springer VS. https://doi.org/10.1007/978-3-662-46678-0_26
Mukherjee, P. (2015). Protecting Cryptographic Memory against Tampering Attack. Department of Computer Science, Aarhus University.
Midtgaard, J. & Møller, A. (2015). QuickChecking Static Analysis Properties. In 8th IEEE International Conference on Software Testing, Verification and Validation (ICST), 2015 (pp. 1-10). IEEE. https://doi.org/10.1109/ICST.2015.7102603
Fang, W., Filos-Ratsikas, A., Frederiksen, S. K. S., Tang, P. & Zuo, S. (2015). Randomized Assignments for Barter Exchanges: Fairness vs Efficiency. In T. Walsh (Ed.), Algorithmic Decision Theory: 4th International Conference, ADT 2015, Lexington, KY, USA, September 27-30, 2015, Proceedings (pp. 537-552). Springer VS. https://doi.org/10.1007/978-3-319-23114-3_32
Wilkinson, B. T. (2015). Revisiting visibility in the plane. Paper presented at International Symposium on Computational Geometry, Eindhoven, Netherlands. http://www.madalgo.au.dk/~bw/papers/2015W.pdf
Bhattacharya, S., Blunck, H., Kjaergaard, M. B. & Nurmi, P. (2015). Robust and Energy-Efficient Trajectory Tracking for Mobile Devices. I E E E Transactions on Mobile Computing, 14(2), 430-443. https://doi.org/10.1109/TMC.2014.2318712
Basile, D., Galletta, L. & Mezzetti, G. (2015). Safe Adaptation Through Implicit Effect Coercion. In C. Bodei, G.-L. Ferrari & C. Priami (Eds.), Programming Languages with Applications to Biology and Security: Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday (Vol. 9465, pp. 122-141). Springer Publishing Company. https://doi.org/10.1007/978-3-319-25527-9_10
Chester, S., Sidlauskas, D., Assent, I. & Bøgh, K. S. (2015). Scalable Parallelization of Skyline Computation for Multi-core Processors. In 31st IEEE International Conference on Data Engineering (ICDE 2015) (pp. 1083 - 1094). IEEE Computer Society Press. https://doi.org/10.1109/ICDE.2015.7113358
Skovsgaard, A. & Jensen, C. S. (2015). Scalable Spatio-Textual Region Querying in Key-Value Stores. Paper presented at ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, Dallas, United States. http://sigspatial2014.sigspatial.org/
Giacomelli, I., Olimid, R. & Ranellucci, S. (2015). Security of Linear Secret-Sharing Schemes Against Mass Surveillance. In M. Reiter & D. Naccache (Eds.), Cryptology and Network Security : 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Vol. 9476, pp. 43-58). Springer. https://doi.org/10.1007/978-3-319-26823-1
Aronov, B., Driemel, A., Van Kreveld, M., Löffler, M. & Staals, F. (2015). Segmentation of trajectories on nonmonotone criteria. A C M Transactions on Algorithms, 12(2), Article 26. https://doi.org/10.1145/2660772
Nunes, F., Verdezoto, N., Fitzpatrick, G., Kyng, M., Grönvall, E. & Storni, C. (2015). Self-Care Technologies in HCI: Trends, Tensions, and Opportunities. ACM Transactions on Computer-Human Interaction, 22(6), Article 33. https://doi.org/10.1145/2803173
Frederiksen, S. K. S. (2015). Semi-algebraic Geometry for Stochastic Games. Department of Computer Science, Aarhus University.
Bosansky, B. & Cemak, J. (2015). Sequence-Form Algorithm for Computing Stackelberg Equilibria in Extensive-Form Games. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence (pp. 805-811). AAAI Press. http://www.aaai.org/ocs/index.php/AAAI/AAAI15/paper/view/9610
Clouston, R. & Goré, R. (2015). Sequent Calculus in the Topos of Trees. In A. Pitts (Ed.), Foundations of Software Science and Computation Structures : 18th International Conference, FOSSACS 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2015, London, UK, April 11-18, 2015, Proceedings (Vol. 9034, pp. 133-147). Springer VS. http://link.springer.com/chapter/10.1007/978-3-662-46678-0_9